Salute to you, Robert, for maintaining this site! Cleared Enterprise today with a 960. I am glad that this is over because Ive heard too much horror stories. This means that I have 2 question answered wrongly, one being in connectivity, and the other for monitoring. I believe (I hope!) that I know which is the two culprits and Ill address them as a contribution to the list.
Question1
There are 2 segments on your network. Suspect too much broadcast from computers. Which tool do you use to investigate?
A. Performance Monitor
B. Windows NT Server 4.0 Network Monitor
C. Some other option
D. Some other option
I chose the second answer. Now, I think that the answer should have been Performance Monitor (using the Network Segment object). The reason Im saying this is because the version of Network Monitor with Windows NT Server 4.0 does not allow you to capture frames from other computers. To perform the latter, we will need to use the version from SMS. Below is a message from Windows NT Server 4.0 Network Monitor when you select Filter from within the Capture menu.
" For security reasons, Windows NT Server Network Monitor captures only network traffic (frames) sent to or from the local computer, including broadcast and multicast frames. To capture frames sent to or from any computer on the network, use the version of Network Monitor included with Systems Management Server."
Question 2
The usual question on Broker dialing into RAS which had been configured with "Allow Any Authentication Including Clear Text" but with a hardware security box. Now, does this setting encrypt data or not? We all know that the NT server DOES NOT encrypt data with "Allow Any Authentication" or M$ will not have another box for "Require Data Encryption". Now, comes the hardware security. We need to do some assumption here; First, The hardware security box encrypts password only. Secondly, it encrypts password and data as well. I know that both hardware boxes exist. I went for the former and probably paid the price for it. Whats your analysis?
My advise; Relax and read the questions carefully because youll get lots of long scenarios and diagrams. If youre overwhelm, mark it and proceed to the next one. Go through the Brain Dumps, Identify your weakness and zero in on those topics. Please do not believe a 100% of all the things you read in the Dump (including this), but instead, do your own research. Books online and TechNet have excellent source of information. Get a grip of Trust (what can/cannot be done from a trusted/trusting domain), Permission/Rights, Fault Tolerance and Recovery.
Patrick